A Framework for Interference Control in Software ... - Roberto Riggio

0 downloads 0 Views 268KB Size Report
an input. Index Terms—Software–Defined Networking, 5G, mobile net- ... emerging new network architecture paradigms promising in- novation in terms of ...
A Framework for Interference Control in Software-Defined Mobile Radio Networks Anteneh A. Gebremariam∗ ; L. Goratti† ; R. Riggio† ; D. Siracusa† ; T. Rasheed† ; F. Granelli∗ ∗ ICT

Doctoral School, University of Trento, Trento, Italy Via Alla Cascata 56/D, 38123 Trento, Italy Emails: [email protected];{name.surname}@create-net.org; [email protected] † CREATE-NET,

Abstract—To cope up with the booming of data traffic and to accommodate new and emerging technologies such as machinetype communications, the 5th Generation (5G) of mobile networks must be empowered with efficient resource allocation schemes that benefit from the adoption of the Software-Defined networking (SDN) paradigm. In radio communications, allocation of resources is tightly connected with interference. In this paper, we revisit the way wireless interference is managed and avoided relying on the SDN paradigm for controlling the network. The SDN approach is exploited to expose the lower layers of the stack (e.g., Physical and Medium Access Control) to the controller and its applications by making system parameters available, such that it is possible to dynamically configure the network in a logically centralized fashion, by means of specifically designed algorithms. The contribution of this work is threefold. First, we show how to adapt the SDN paradigm to mobile networks. Second, we propose the interference graph as an abstraction that can be used to control interference. Last, we formulate a throughput optimization tool that uses the proposed interference graph as an input. Index Terms—Software–Defined Networking, 5G, mobile network, abstractions, interference graph.

I. I NTRODUCTION With the rapid increase of services and user data traffic demand transported over the mobile network, node deployments become more dense resulting in significantly higher levels of wireless interference. This is the case of communications taking place in the 2.4 GHz ISM band as well as for the 4G UMTS Long Term Evolution (LTE) and its advanced development LTE-A, which uses a frequency Reuse 1 approach. This problem will be further exacerbated with small cells deployment and future 5G communication systems that will make the network even denser. Interference is the number one enemy of radio communications limiting coverage, capacity and more in general efficiency. Current network control and management tools lack scalability, flexibility and reconfiguration capabilities that modern telecommunication systems ought to have. Software-Defined Networking (SDN) [1] is one of the emerging new network architecture paradigms promising innovation in terms of network programmability by allowing network control and management whereby high level abstractions. This is achieved by separating the control (which decides where traffic is addressed and how) and data planes (simply forwarding flows of data packets) with well-defined programmable interfaces in order to provide i) a centralized

global view of the underlying network and ii) an easier way to configure and manage the network whereby the abstractions. Future mobile communications that are moving toward 5G will require unprecedented flexibility, scalability and reconfiguration capability of different network segments. One severe limiting factor to the efficiency of radio communications is interference. This problem was studied for decades and many different solutions at both physical layer (PHY) and medium access control (MAC) layer have emerged with time but so far none of them managed interference satisfactorily. In this paper, we first deem to extend the concepts of SDN to mobile radio networks in such a way to lend to generalization of the SDN approach. Doing such an endeavor is currently under study in several research studies [1], [2] despite the SDN concepts cannot be directly applied in the wireless domain. The contribution of this work is threefold. First, we focus on 4G LTE cellular networks and we show a possible way to map the concept of SDN to a 4G evolved Node B (eNB) looking the problem at the transmitter side (although it holds similar for the receiver). Second, starting from this mapping we identify a set of network related parameters that can be exposed to the upper layers in the form of abstractions. This set includes typical radio parameters such as transmitted power, code rate of the forward error correction (FEC) and 4G specific parameters such as modulation and coding scheme (MCS) and number of antenna elements in a multiple input multiple output (MIMO) antenna system. Based on that we develop an interference graph (IG) abstraction that can be used by the SDN controller to optimize network segments using several practical constraints. Therefore, tuning parameters in the IG will be reflected by a different configuration of interference. Last, we present a formulation that can be used in a control loop to optimize the behavior of the network as a whole in a portion of space, according to the information provided by the IG. The reminder of the paper is organized as follows. Section II describes the related works in the area. In Section III, the system design and architecture is presented. The problem formulation and system interference modeling is discussed in Section IV and V respectively. The resource allocation and optimization is explained in Section VI. Finally, conclusions are drawn in Section VII.

II. R ELATED W ORK In this section, we discuss the most notable research works that are closely related to ours. OpenFlow wireless (also known as OpenRoads) [2] prescribes that users can move freely between any wireless infrastructure while providing billing functions to infrastructure owners, which could motivate CAPEX. It uses FlowVisor [3] for network slicing and to handoff the control of different flows to different controllers. OpenRadio [4] is a design that gives modular and declarative programming interfaces by separating the wireless protocols into two planes, processing and decision. This provides a way to build a network abstraction to find a trade-off between performance and flexibility. The sub-optimality of distributed control system in cellular networks (e.g., 4G LTE) is the main motivation behind SoftRAN [5]. The target of SoftRAN is to design a centralized control-plane for radio access networks (RANs) to address the issues related to radio resource allocation, interference reduction, handover and load balancing to yield system performance improvement. The design goals are achieved by aggregating base stations in a wider virtual base station and a centralized control system. In contrast to OpenRadio and SoftRAN, in which the ideas concentrate around the radio part of the cellular system, SoftCell [6] addresses the issues of inflexible and expensive equipment and complex control plane functions in cellular core networks using commodity switches and servers. Simulations and realistic LTE workload emulations on SoftCell show improved scalability and flexibility in cellular core networks. The work in [7] proposes the concept of a virtual cell (Vcell) with an architecture aiming to overcome the technical limitations of Layer one and Layer two in conventional wireless networks. V-cell abstracts all the resources provided by a pool of base stations into a single large resource space to a centralized control-plane in the SDN RAN controller. The resource space which is also known as ResouceP ool is a ndimensional (i.e., time, frequency, space, power, etc.) matrix of LTE resource blocks (RBs). Several ways of representing interference are available in the literature. In [8] a detailed survey of interference models in wireless ad hoc networks is presented. Three major groups are identified as follows •



Statistical interference models: they assume the aggregate interference as the sum of individual interfering signals. The main drawback of this model is that closed-form expressions for the aggregate interference distribution exist only in specific network deployments. Models that describe the effect of interference: they are divided in two groups. Protocol Interference Models, based on the vulnerability area capture model of transmitter and receiver pairs. These models are simple and facilitate IG construction. Physical Interference Models, which consider transmitter receiver pair and computes the aggregate interference mainly using the threshold Signalto-Interference-plus-Noise Ratio (SINR) (i.e., transmis-

Fig. 1: Software–Defined Mobile Radio Access Network architecture [7]



sion will be successful if f SIN R ≥ β). Graph-based interference models, which exploit elements of Graph Theory to analyze interference between terminals and links. III. S YSTEM D ESIGN

The high-level system architecture for a Software-Defined wireless network that split the functionalities of control and data planes to leverage an efficient resource allocation scheme with reduced interference is presented in Figure 1. The actual network elements are at the moment 4G eNBs and heterogeneous radio access technologies (RATs) small cell base stations. The leaf nodes of this architecture are the user equipments (UEs). Both network nodes will be implicit assumed in the remainder of the paper and the system architecture will be used as basis for the discussion hereinafter. A. System Architecture The upper part of Figure 1 show the controller. This is the core element of the architecture responsible for some of the most important (re)configuration functionalities of the network. The controller interfaces to different applications that are involved in programming the abstractions exposed by the lower layers of the protocol stack with a goal of improving the performance and manageability of the (geographically) wide network. Relying on a global network view (i.e., radio resources from each base station), the controller facilitates optimization of resource scheduling. In addition, all decisions that allow latency constraint relaxation are taken by the controller and then passed to the underlying network (e.g., small cell devices). Other functions of the controller include managing the no-handover area between base stations, virtualization of the wireless network (i.e., coexistence of different RATs) and interference management. The local controllers provide the local control plane of each base station as a result of separating the control plane from the underlying physical infrastructure. Each local controller

ulating the Reference Signal transported over a RB depending on the number of antenna ports used for the transmission. Combining all the components, equation (1) shows a more formal representation of the output vector (Y ) at the physical antennas as a function of the input vector X of code-words and matrix (H) that accounts for the mapping described above. Y =H·X ,

Fig. 2: The Switch Port Analogy for Wireless Networks.

could also be seen as the abstraction of the radio resources that are available for scheduling in each base station. The local controllers are responsible of taking short-time scale (sub-milliseconds) local decisions. Moreover, the feedback information collected from each UE is forwarded to the Data-Center, which aggregates distributed information in a centralized storage, through the local controllers. The optimization subsystem collects information from the network (i.e., based on the global view) and performs optimization of multiple parameters for the active links in the underlying wide network targeting to minimize / maximize some predefined cost functions. For each resource allocation request from the UEs the optimization subsystem computes the optimal allocation of RB, MCS, transmitted power (PT x ) and MIMO parameters. B. Revisiting SDN for cellular networks After the optimal selection of resources for a set of links, the following step consists of deciding how the information should be transmitted through the air–interface. In wired Local Area Network (LAN), switches have a set of input ports (Ii ) that are mapped into outputs (Oi ) where the mapping is done based on specific rules contained in a forwarding table. In mobile network input code-words (CWs) are mapped to physical antenna ports (see Fig. 2) where the mapping, which consists of selecting modulation and coding schemes, transmission power, etc. is driven by the actual channel conditions. Depending on the channel feedback information received from the UEs, the controller have to decide whether relying on diversity in the transmission or use spatial multiplexing and beam-forming. As shown in Figure 2, the mapper block maps the streams in layers depending on the rank of channel impulse response. In other words, the number of independent spatial layers that contains serial-to-parallel blocks to facilitate the mapping accordingly. The precoder (W ), which is determined by the Rank Indicator and the number of antenna ports, is a codebook defined by 3GPP specifications. This is a complex weight used for each layer to match the transmission to the propagation conditions of the channel, which results in mapping each layer to one or more logical antenna ports. The mapping of antenna ports to the physical antennas varies from base station to base station and from vendor to vendor [9]. This mapping is identified by the UE automatically by demod-

(1)

where the size of X is a vector of size equal to the number of CWs and Y is a vector of size equal to the number of physical antennas. Thus, the selection of H is done by the centralized controller based on the channel feedback information of the UEs. The output of each physical antenna port can be represented by a tuple of parameters representing an abstraction of the resources assigned to a stream of packets. IV. P ROBLEM F ORMULATION In this section, we present the formulation of the interference control framework that is the key contribution of this work. The flow chart in Figure 3 shows the functional components that have to be part of the central SDN controller shown in Figure 1. Referring to cellular LTE/LTE-A networks, a resource is a multi-dimensional element that can be characterized by a tuple of parameters as follows: . Each of these parameters have different impact on PHY and MAC layers functions. More in specific, for this work we envision the situation that rises as soon as small cells base station will be deployed, although the description of the framework is general enough to be suitable in many types of contexts. Using the Software-defined paradigm for wireless networks, we aim to design a suitable abstraction to be exposed to the upper layers whereby optimizing globally the underlying network and to formulate an efficient resources allocation optimization that relies on controlling the aggregate interference. Accordingly, two tightly connected representation of the network are the bonds between interference and network connectivity. Namely, they are the IG and the conflict graph (CG) that descends directly from the IG. The IG models the interference among communication links. The goal here is to establish an autonomous framework to reduce/avoid interference. Based on the IG the conflict graph gives an insightful representation of the way the interference of each transmission links affects the others. In essence, to each interfering link is assigned a weight that corresponds to the amount of interference generated by the interferer on other receivers. The optimizer block shown in Figure 3 makes the attempt to minimize these weights globally targeting a lower level of aggregate interference within a certain spatial region. The information that is transmitted to a recipient is then fed to a physical antenna port. Therefore, each information at the output of a port (i.e., the concept of port for LTE networks revisited in light of SDN is shown in Figure 2) is represented by the tuple of parameters explained above. The loop in Figure 3 represents the continuous monitoring of the network through

Fig. 3: Functional view of interference control framework running inside the central SDN controller.

Fig. 4: IG (purple dashed lines) built on top of the connectivity graph between transmitter-receiver pairs (black solid lines).

which feedback information is collected from the UEs, sent to the ports and fed back to the IG block. Based on Shannon’s capacity equation as shown in (2), we can see the dependencies of the PHY layer parameters on the capacity. Where B is the channel bandwidth and N0 is the two-sided noise power spectral density.

UEs in range. In this scenario, V stands for the set of UEs in the wide network connected by edges that belong to the set E to represent the pairwise interference among neighboring communication links. The edge connecting two transmission links exists if the transmitter of one transmission link is within the interference range of a receiver that is part of another transmission link. An example of such graph is represented as dashed–lines in Figure 4. The directed edges (dashed–lines) indicate which nodes are interfering with which terminals. For building the IG, the central SDN controller shown in Figure 1 should collect information from all the communication links for a certain period of time (construction of a history). In addition, it is also possible to compute the IG using micro-probing, which is done by injecting traffic into the network to infer the occurrence of interference. Even though micro-probing is quite accurate, the overhead is very demanding in large scale networks.

 Ci = B log2 1 +

Pi |Xi − XR(i) |−η P N0 B + Pk |Xk − XR(i) |−η

 ,

(2)

k6=i

where Pi is the transmitted power, which is the power for a transmitted symbol. For each symbol encoded with N bits the PN (bit) power of one symbol is obtained by Pi = i=1 Pi , where bit Pi is the transmitted power per bit. In order to determine the suitable modulation index (that in turn determines the value of N ) for a certain transmission, the method could rely on using existing constraints on the desirable bit error probability (Pe ) for a communication link. Upon fixing a desirable value of Pe it is possible to compute the average SINR, which is directly connected to the modulation scheme (e.g., QPSK or QAM) amongst other relevant network related conditions. In LTE/LTE-A a specific modulation and coding scheme (MCS) is selected depending on the received SINR that can be computed relying on the measurements fed back by the terminals. The antenna port number is another optional design parameter whose setting is automatically selected by the base station depending on feedback and channel state information. V. I NTERFERENCE M ODELLING This section presents the interference analysis starting from the construction of the connectivity graph from which IG and CG can be derived [8]. In order to account for the aggregate interference generated by different transmitters pairs on a reference transmission link, weighted CG is used as explained below [10]. A. Interference Graph The IG is a graph characterized by the pair (V, E) that is used to represent the interference among different communication links (transmitter-receiver pairs) in the network. As mentioned in previous section, the network is intended here in a broader sense. Indeed a spatial region wherein different small cell base stations are deployed and communicating with

B. Conflict Graph Construction Considering a set of transmitter–receiver pairs {(Xi , XR(i) ): i ∈ N}, where Xi and XR(i) represent the location of the transmitting and receiving terminals respectively. Focusing on a downlink transmission, the connectivity graph can be constructed as a directed graph from the eNBs (Xi ) to the UEs (XR(i) ), see Figure 4. According to the Physical Interference Model discussed in [8], to have a successful reception at the receiver XR(i) , SINR ≥ β. The maximum allowed interference level Ii,max at the receiver is given by (3). Ii,max = β −1 Pi |Xi − XR(i) |−η − σ 2 ,

(3)

where Pi represents the transmit power of the eNBs, σ 2 is the additive noise power and η is the path loss exponent. The maximum allowable interference contribution of the kth interfering link (Xk , XR(k) ) on terminal XR(i) is with the fraction given by (4). wik = Sm X lk

Pk |Xk − XR(i) |−η Ii,max

wik ≤ 1

(4) (5)

L X L X R X M X

min

ϕi,k,r,m

k wi,r,m · ϕi,k,r,m

(6a)

i=1 k=1 r=1 m=1 k6=i

s. t. L X M X

Fig. 5: Conflict Graph construction, which descends from the Interference Graph, gives a clear information concerning the strength of interference among links.

ϕi,k,r,m ≤ 1

∀i, r,

(6b)

k=1 m=1 k6=i M X

ρi,k,m ≤ 1

∀i, k,

(6c)

m=1

ϕi,k,r,m ≤ ρi,k,m Let li as the communication link between transmitterreceiver pair (Xi , XR(i) ), being represented by a vertex in a weighted conflict graph. According to the model in [10], there is a weighted edge directed from vertex lk to vertex li with a weight of wik for i, k ∈ N and i 6= k. From the weighted conflict graph, which is shown in Figure 5, its possible to determine a set of communication links (i.e., li ∈ Sm ) that could be active at the same time considering the expression in (5) is satisfied. Hence, the links li ∈ Sm can be scheduled at the same time-slot, i.e., the aggregate interference caused by those links is below the allowed maximum interference level Ii,max . Thus, the lower the values of each weight, wik , on every edge results in more number of links included in Sm . VI. R ESOURCE A LLOCATION AND O PTIMIZATION After constructing the conflict graph, the following step is to come up with a model that will lower the values of the weights wik of the conflict graph. In order to account this, an efficient resource-scheduling/power-allocation technique needs to be adapted. The following section describes the important parameters that have a direct/indirect effect on the interference or system performance. Considering a base station (either macro or small cell) having L transmission links allocated we can define a set of tunable parameters which directly affect the conflict graph. The tunable parameters include: i) transmission links (UE, eNB) pairs L = {1, 2, .., l, .., L}; ii) RBs (frequency, time, space) R = {1, 2, ..., r, .., R} and iii) MCSs M = {1, 2, ..., m, ..., M }. The objective here is to reduce the aggregate interference on a certain transmission link li , i.e., targeted to reduce the weight of the edges as in (4) , or to maximize the SINR at the receiver. Since the weights on the edges and the interference created by the interfering links are directly proportional, equivalently we can minimize the weights by optimizing the power allocation on each link [11]. The resource allocation problem that results in a reduced weights of the edges of a conflict graph can be formulated as an integer linear problem. Consequently, the objective function of the optimization problem is given as (6a) considering each link li corresponds to a certain downlink transmission with (transmitter, receiver) pair as shown in Figure 5 (i.e., solid black circles).

R X M X

∀i, k, r, m,

ref T Pi,k,r,m · ϕi,k,r,m ≥ T Pi,k ∀i, k,

(6d) (6e)

r=1 m=1

ρi,k,m ∈ {0, 1}

∀i, k, m,

(6f)

ϕi,k,r,m ∈ {0, 1}

∀i, k, r, m,

(6g)

∀i, k.

(6h)

Pmin ≤ Pi ≤ Pmax

Equations (6b) to (6h) represent the constraint functions for the optimization problem expressed in (6a) where the k expression for wi,r,m is given in equation (4). ϕi,r,m in (6g) is a decision binary variable, which is 1 if link li uses MCS m in RB r or 0 otherwise. Similarly, equation (6f) is also a binary variable that is equal to 1 if link li use MCS m or 0 otherwise. Considering each eNBs constraint (6b) makes sure that RB r is only assigned to a single link li (i.e., for links served by the same transmitting eNB; if the links are in different eNBs then the space component of the RB makes sure that each RB is assigned to single link), and constraints (6c) and (6d) together guarantee that each link is allocated to at most one MCS. Constraint (6e) makes sure that each link achieves its throughput demands req T Pi,k . Finally the last constraint (6h) sets the interval for the possible transmission power level. k The objective function in (6a) minimizes the weight wi,r,m by optimizing the allocation of RB, transmit power and MCS in the overall network. The matrix W, which is a 2dimensional L×L matrix gives the overall weight assigned to the edges of the conflict graph. Each row in W represents the interference on every single link in the presence of L-1 simultaneous transmissions.    W=  

w11 w21 w31 . 1 wL

w12 w22 w32 . 2 wL

w13 w23 w33 . 3 wL

. . . . .

. . . . .

. . . . .

w1L w2L w3L . L wL

     

Where the self-interference term wii = 0. Therefore, minimizing the values of W means solving the integer programming problem represented by the cost function (6a) considering the constraints.

VII. C ONCLUSIONS In this paper, a general software-defined based framework for mitigating interference in mobile radio networks is introduced. Using the global view of the network, a centralized interference analysis enables an optimized radio resource allocation. A set of mobile network system parameters ,, are abstracted to higher layers in order to improve the programmability of the network. Moreover, the concept of switch port for wireless network is presented to further improve the flexibility of choosing the right mapping in a centralized manner. This is a preliminary investigation. As part of the future works, we are currently working on implementing a software-defined wireless framework using an open-source hardware/software development platform called OpenAirInterface (OAI), which simulates the LTE protocol stack. Furthermore, we will carry out the system evaluation by resorting to different experimental simulations. R EFERENCES [1] Hyojoon Kim and Nick Feamster, “Improving Network Management with Improving Network Management with Software Defined Networking,” IEEE Communications Magazine, pp. 114–119, February 2013. [2] Kok-Kiong Yap, Rob Sherwood, Masayoshi Kobayashi, Te-Yuan Huang, Michael Chan, Nikhil Handigol, Nick McKeown, and Guru Parulkar, “Blueprint for Introducing Innovation into Wireless Mobile Networks,” VISA 2010, New Delhi, India, pp. 1–8, September 3 2010. [3] Rob Sherwood, Glen Gibb, Kok-Kiong Yap, Guido Appenzeller, Mart´ın Casado, Nick McKeown and Guru Parulkar, “FlowVisor:A Network Virtualization Layer,” Deutsche Telekom Inc. Stanford University, Nicira Networks, Tech. Rep. OPENFLOW-TR-2009-1, October 14 2009. [4] Manu Bansal, Jeffrey Mehlman, Sachin Katti and Philip Levis, “OpenRadio: A Programmable Wireless Dataplane,” HotSDN’12, Helsinki, Finland, pp. 109–114, August 2012. [5] Aditya Gudipati, Daniel Perry, Li Erran Li, Sachin Katti, “SoftRAN: Software Defined Radio Access Network,” HotSDN’13, Hong Kong, China, pp. 25–30, August 16 2013. [6] Xin Jin, Li Erran Li, Laurent Vanbever and Jennifer Rexford, “SoftCell: Scalable and Flexible Cellular Core Network Architecture,” CoNEXT’13, Santa Barbara, California, USA, pp. 1–13, December 9-12 2013. [7] Roberto Riggio, Karina Gomez, Leonardo Goratti, Riccardo Fedrizzi and Tinku Rasheed, “V–Cell: Going Beyond the Cell Abstraction in 5G Mobile Networks,” SDNMO workshop in Network Operations and Management Symposium (NOMS), 2014 IEEE, pp. 1–5, 2014. [8] Paulo Cadieri, “Modeling Interference in Wireless Ad Hoc Networks,” IEEE Communications Surveys and Tutorials, vol. 12, no. 4, pp. 551– 572, 2010. [9] Wireless Technologies/Signal generators, “Continuing in the direction of LTE-Advanced: the latest test signals for LTE Rel. 9 White Paper,” Rode and Schwarz. [10] Kamal Jain, Jitendra Padhye, Venkat Padmanabhan and Lili Qiu, “Impact of Interference on Multi-hop Wireless Network Performance,” MobiCom’03, San Diego, California, USA, pp. 1–14, September 14-19 2003. [11] David Lopez-Perez, Akos Ladanyi, Alpar Juttner, Herve Rivano and Jie Zhang, “Optimization Method for the Joint Allocation of Modulation Schemes, Coding Rates, Resource Blocks and Power in Self-Organizing LTE Networks,” Mini-Conference at INFOCOM, 2011 Proceedings IEEE, Shanghai, Chaina, pp. 111–115, April 10-15 2011.

Suggest Documents